NOTE: When cracking WPA/WPA2 passwords, make sure you check first incase it's already been processed.

Home - Found Passwords from Not Found Lists - Any info on this hash type?

Due to the number of SCAMS going on in the PAID forum, PLEASE ask an ADMIN or MODERATOR to verify ALL found passwords to ensure you are not being SCAMMED.
DO NOT PAY until an ADMIN or MOD has verified them for you!

1 Results - Page 1 of 1 -
Author Message

Status: n/a
Joined: Sun, 07 Jan 2018
Posts: 5
Reputation: 0 Reputation
Thu, 05 Jul 2018 @ 14:09:59


This isn't a hash cracking request. I was wondering if anyone has any info on the hash types in the mystudiyo leak. It seems a mix of MD5, with mostly SHA1 and possibly MySQL5, VB, IPB or some other 40 character hash, with and without salts (mostly no salt).

All I can find on the leak so far is this:
Which doesn't say what the hash types are.

I've tried a range of modes in hashcat without any real success... at best only a small list of numerical strings (e.h. 111111111, 233442223) are founds in straight SHA1 mode. I've tried using the email address as a salt, as well as a blank salt, with no joy.

Here's a sample of what the majority of hashes from the breach look like, with email addresses removed:


Any help would be appreciated

1 Results - Page 1 of 1 -

We have a total of 167021 messages in 20896 topics.
We have a total of 18748 registered users.
Our newest registered member is behuro.